Academic literature on the topic 'REPACKAGING DETECTION'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'REPACKAGING DETECTION.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "REPACKAGING DETECTION"

1

Rastogi, Sajal, Kriti Bhushan, and B. B. Gupta. "Android Applications Repackaging Detection Techniques for Smartphone Devices." Procedia Computer Science 78 (2016): 26–32. http://dx.doi.org/10.1016/j.procs.2016.02.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Gi Seong, and Huy Kang Kim. "Android Game Repackaging Detection Technique using Shortened Instruction Sequence." Journal of Korea Game Society 13, no. 6 (December 20, 2013): 85–94. http://dx.doi.org/10.7583/jkgs.2013.13.6.85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gurulian, Iakovos, Konstantinos Markantonakis, Lorenzo Cavallaro, and Keith Mayes. "You can’t touch this: Consumer-centric android application repackaging detection." Future Generation Computer Systems 65 (December 2016): 1–9. http://dx.doi.org/10.1016/j.future.2016.05.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jaewoo Shim, Minjae Park, Seong-je Cho, Minkyu Park, and Sangchul Han. "Dynamic Analysis of Android Apps written with PhoneGap Cross-Platform Framework." Research Briefs on Information and Communication Technology Evolution 4 (August 15, 2018): 18–27. http://dx.doi.org/10.56801/rebicte.v4i.62.

Full text
Abstract:
In this paper, we propose an effective technique that can perform dynamic analysis for Android appwritten with PhoneGap cross-platform framework. For a systematic study, we have written a maliciousAndroid app using PhoneGap framework. We compare the structural differences between abasic Android app (a native app) and the other malicious Android app built in release mode on Phone-Gap framework, and also analyze the malicious app dynamically. The proposed technique first copiesthe web root directory of the target malicious app into a writable directory inside the smartphone.When the app is executed, its web pages and Javascript files are loaded from the copied directoryusing a dynamic instrumentation. Finally, we dynamically change the flag for WebView debuggingso that a remote debugger can successfully be attached to the app built in release mode. Using ourproposed technique, a malware analyst can debug a malicious PhoneGap app built in release modewithout repackaging, which cannot be debugged as it is by Chrome remote debugger. She/he canalso utilize the debugging features supported by the remote debugger. The technique allows the analystto bypass the repackaging detection method that malicious apps use to avoid antivirus detection.
APA, Harvard, Vancouver, ISO, and other styles
5

Merlo, Alessio, Antonio Ruggia, Luigi Sciolla, and Luca Verderame. "ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection." Pervasive and Mobile Computing 76 (September 2021): 101443. http://dx.doi.org/10.1016/j.pmcj.2021.101443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cho, Haehyun, Jiwoong Bang, Myeongju Ji, and Jeong Hyun Yi. "Mobile application tamper detection scheme using dynamic code injection against repackaging attacks." Journal of Supercomputing 72, no. 9 (June 2, 2016): 3629–45. http://dx.doi.org/10.1007/s11227-016-1763-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Xiao, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, and Kui Ren. "Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection." IEEE Transactions on Information Forensics and Security 15 (2020): 987–1001. http://dx.doi.org/10.1109/tifs.2019.2932228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gurulian, Iakovos, Konstantinos Markantonakis, Lorenzo Cavallaro, and Keith Mayes. "Reprint of “You can’t touch this: Consumer-centric android application repackaging detection”." Future Generation Computer Systems 80 (March 2018): 537–45. http://dx.doi.org/10.1016/j.future.2017.11.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Jun, Qing-Wei Sun, Chang Xu, and Xian-Ping Tao. "GridDroid—An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User Interface." Journal of Computer Science and Technology 37, no. 1 (January 31, 2022): 147–81. http://dx.doi.org/10.1007/s11390-021-1659-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Albert, Valerie, Michael Lanz, Georgios Imanidis, Kurt E. Hersberger, and Isabelle Arnet. "Stability of medicines after repackaging into multicompartment compliance aids: eight criteria for detection of visual alteration." Drugs & Therapy Perspectives 33, no. 10 (July 26, 2017): 487–96. http://dx.doi.org/10.1007/s40267-017-0431-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "REPACKAGING DETECTION"

1

KUMAR, NIRAJ. "ANDROID APP REPACKAGING DETECTION USING SIGNING CERTIFICATE AND PERMISSIONS COMPARISON." Thesis, 2018. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19109.

Full text
Abstract:
Android eco system works in two steps as far as an application developer is concerned. In the first step, developers design and develop an Android app and subsequently publish it on Google Play Store either as paid apps or with some advertisements to earn monetary benefit or sometimes as free app just for building user base. Besides the bona fide Android ecosystem, there is a parallel dark world of malicious attackers who repackage other developer's application (Free apps available in Play Store or other app stores) and publish it with their own name. Alternatively, they add advertisements with their own bank accounts or even add malicious code and use it for their own benefit. In a similar fashion, malicious attackers embed malware payload into the original applications so as to gain control of the mobile devices on which they are running to retrieve the private data of the user, stealthily read or send SMS messages to premium rate numbers, read banking credentials and so on. Although there are many identification methods which have been used traditionally to detect these repackaged applications existing in various Android app stores. However, it is not always effective to analyse any new application. Repackaged apps are a serious vulnerability these days in Android phones. Various threat mitigation measures have been devised like watermarking in case of rooted device. But, a defence mechanism that prohibits repackaged apps from running on a user device (non-rooted device) is not common. Our repackage-proofing technique for Android apps is trustworthy and covert. Repackaged apps present considerable challenge to the security and privacy of smartphone users. But fortunately such apps can be made to crash (randomly crash to confuse attackers) using keystore check as well as permissions added in repackaged code. Even other techniques like code obfuscation using ProGuard tool are helpful. It does not require any change at the Framework or System level. Private key used to sign the apk is with the original developer. Any app which is installed in an Android system need to pass signature validation. PackageManager API reads an apk and extracts the app information. It then saves the information in three different files on device path /data/system. Out of these three files, the most important is packages.xml. It contains key information like names, code paths, public keys, permissions, etc., 2 | P a g e for all the installed apps. PackageManager API is used to retrieve Kr from the file. We split this Kr value into 8 equal parts and store it as constants in different classes. At runtime, we merge these parts to recreate Kr and compare it with Kr value returned by making use of PackageManager. For repackaged apps as signing key has changed, the two Kr values will be different.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "REPACKAGING DETECTION"

1

Guo, Junxia, Dongdong Liu, Rilian Zhao, and Zheng Li. "WLTDroid: Repackaging Detection Approach for Android Applications." In Web Information Systems and Applications, 579–91. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60029-7_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Guan, Quanlong, Heqing Huang, Weiqi Luo, and Sencun Zhu. "Semantics-Based Repackaging Detection for Mobile Apps." In Lecture Notes in Computer Science, 89–105. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30806-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Jinghua, Xiaoyan Liu, Huixiang Zhang, and Dejun Mu. "A Scalable Cloud-Based Android App Repackaging Detection Framework." In Green, Pervasive, and Cloud Computing, 113–25. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39077-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gadyatskaya, Olga, Andra-Lidia Lezza, and Yury Zhauniarovich. "Evaluation of Resource-Based App Repackaging Detection in Android." In Secure IT Systems, 135–51. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47560-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Huang, Heqing, Sencun Zhu, Peng Liu, and Dinghao Wu. "A Framework for Evaluating Mobile App Repackaging Detection Algorithms." In Trust and Trustworthy Computing, 169–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38908-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jiao, Sibei, Yao Cheng, Lingyun Ying, Purui Su, and Dengguo Feng. "A Rapid and Scalable Method for Android Application Repackaging Detection." In Information Security Practice and Experience, 349–64. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17533-1_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jiao, Sibei, Yao Cheng, Lingyun Ying, Purui Su, and Dengguo Feng. "Erratum: A Rapid and Scalable Method for Android Application Repackaging Detection." In Information Security Practice and Experience, E1. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17533-1_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "REPACKAGING DETECTION"

1

Yue, Shengtao, Weizan Feng, Jun Ma, Yanyan Jiang, Xianping Tao, Chang Xu, and Jian Lu. "RepDroid: An Automated Tool for Android Application Repackaging Detection." In 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC). IEEE, 2017. http://dx.doi.org/10.1109/icpc.2017.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zeng, Qiang, Lannan Luo, Zhiyun Qian, Xiaojiang Du, and Zhoujun Li. "Resilient decentralized Android application repackaging detection using logic bombs." In the 2018 International Symposium. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3179541.3168820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zeng, Qiang, Lannan Luo, Zhiyun Qian, Xiaojiang Du, and Zhoujun Li. "Resilient decentralized Android application repackaging detection using logic bombs." In CGO '18: 16th Annual IEEE/ACM International Symposium on Code Generation and Optimization. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3168820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yuan, Cangzhou, Shenhong Wei, Chengjian Zhou, Jiangtao Guo, and Hongyue Xiang. "Scalable and Obfuscation-Resilient Android App Repackaging Detection Based on Behavior Birthmark." In 2017 24th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2017. http://dx.doi.org/10.1109/apsec.2017.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wolfgong, W. John, and James Izzo. "Materials Analyses for Parts Validation." In ISTFA 2015. ASM International, 2015. http://dx.doi.org/10.31399/asm.cp.istfa2015p0199.

Full text
Abstract:
Abstract The most common methodologies for determining whether a component should be judged suspect counterfeit, or not, rely on visual examination, electrical test, and X-ray examinations. While these are commonly sufficient at such determinations, more thorough examinations may be pursued - in particular materials characterizations. In this paper, examples are given in which such “non-standard” methods are employed. Additionally, the results of an investigation as to the applicability of such methods towards detection of surface alteration to facilitate repackaging are described.
APA, Harvard, Vancouver, ISO, and other styles
6

Parvin, Daniel F., and Thomas Huys. "Performance of a DrumScan® HRGS Solo Scanner for the Assay of Legacy Waste at the Belgoprocess Site." In ASME 2011 14th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2011. http://dx.doi.org/10.1115/icem2011-59122.

Full text
Abstract:
On the sites of Belgoprocess several thousands of drums containing conditioned legacy waste are stored. A significant number of these waste packages are 220 litre drums containing radioactive waste embedded into inactive bitumen. Most of the radioactive waste in these drums was generated during the development and production of MOX-fuels and the operation of the Eurochemic reprocessing plant. The current state of a number of these packages is no longer acceptable for long term storage. In order to make the waste packages acceptable for interim storage a repackaging process was developed. The process involves the repackaging of the waste items into 400 or 700 litre waste drums and a non-destructive gamma-ray assay (NDA) measurement performed on the new package. The aim of the NDA measurement is to detect significant quantities of fissile material in order to demonstrate compliance with the operational limits of the storage building. Since the waste items are destined for geological disposal, there is no specific need for a detection limit in the order of milligrams of plutonium as required for surface disposal. To meet this NDA requirement Babcock International Group supplied, calibrated and commissioned an open geometry system from its HRGS product range. The DrumScan® HRGS Solo assay system was delivered to the Belgoprocess site in 2009 after completing a series of factory acceptance tests performed in the UK. In May 2009 after successful completion of the site acceptance tests performed in Belgium, the system has been undergoing extensive testing and validation by Belgoprocess in order to demonstrate acceptance and compliance to the Belgian Radioactive Waste Agency, NIRAS/ONDRAF. After a careful evaluation of the qualification file, NIRAS/ONDRAF approved the system for operational measurements at the end of 2010. This paper provides a detailed description of the NDA requirement, calibration methodology, system validation tests and overall measurement performance of the system.
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Wenjun, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, and Ting Han. "MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph." In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE, 2014. http://dx.doi.org/10.1109/icccn.2014.6911805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yue, Shengtao, Qingwei Sun, Jun Ma, Xianping Tao, Chang Xu, and Jian Lu. "RegionDroid: A Tool for Detecting Android Application Repackaging Based on Runtime UI Region Features." In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2018. http://dx.doi.org/10.1109/icsme.2018.00041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sharma, Shivam, Firoj Alam, Md Shad Akhtar, Dimitar Dimitrov, Giovanni Da San Martino, Hamed Firooz, Alon Halevy, Fabrizio Silvestri, Preslav Nakov, and Tanmoy Chakraborty. "Detecting and Understanding Harmful Memes: A Survey." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/781.

Full text
Abstract:
The automatic identification of harmful content online is of major concern for social media platforms, policymakers, and society. Researchers have studied textual, visual, and audio content, but typically in isolation. Yet, harmful content often combines multiple modalities, as in the case of memes. With this in mind, here we offer a comprehensive survey with a focus on harmful memes. Based on a systematic analysis of recent literature, we first propose a new typology of harmful memes, and then we highlight and summarize the relevant state of the art. One interesting finding is that many types of harmful memes are not really studied, e.g., such featuring self-harm and extremism, partly due to the lack of suitable datasets. We further find that existing datasets mostly capture multi-class scenarios, which are not inclusive of the affective spectrum that memes can represent. Another observation is that memes can propagate globally through repackaging in different languages and that they can also be multilingual, blending different cultures. We conclude by highlighting several challenges related to multimodal semiotics, technological constraints, and non-trivial social engagement, and we present several open-ended aspects such as delineating online harm and empirically examining related frameworks and assistive interventions, which we believe will motivate and drive future research.
APA, Harvard, Vancouver, ISO, and other styles
10

Thornley, David John, Kareena McCrindle, Stephen Rayner, Jonathan Sharpe, Czeslaw Pienkowski, and Carl Phillips. "The Application of Additional, Off-Line, Analysis Techniques to PCM Monitor Results to Aid the Efficient and Cost Effective Repackaging of Legacy PCM Wastes Containing Calcium and Potentially Plutonium Fluoride." In ASME 2009 12th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2009. http://dx.doi.org/10.1115/icem2009-16034.

Full text
Abstract:
There are a small number of legacy, orphan waste, PCM (Plutonium Contaminated Material) drums at Sellafield Site containing calcium metal potentially contaminated by plutonium (Pu), some of which may be in the form of plutonium fluoride (PuF4). These drums were measured on a TRU-D® PCM Drum Monitor to give a Nuclear Safety value for the Pu mass based on Neutron Coincidence Counting (NCC) and the Pu isotopic composition measured for each drum using a germanium detector based High Resolution Gamma Spectrometry system. In some circumstances the presence of Pu in the form of PuF4 can cause a significant overestimate of the measured Pu mass. This is as a result of alphas emitted by the spontaneous decay of Pu isotopes interacting with light elements such as fluorine, resulting in the emission of “random” (alpha, n) neutrons. The potential overestimate may be very large for total neutron counting based systems if the presence of PuF4 is not accounted for in the system calibration. However, significant quantities of PuF4 may also result in overestimates for NCC systems due to potentially large statistical uncertainties in the measurement results caused by accidental coincidences involving the random (alpha, n) neutrons. Therefore in some circumstances, less pessimistic measurements may be obtained from the total neutron count, corrected using the measured “PuF4 ratio”. Standard TRU-D® Drum Monitor measurements of the calcium containing drums were carried out by plant operators. Relevant data was then downloaded from the plant instrument allowing additional off-line techniques to be applied to the high resolution gamma spectra associated with each drum. These spectra are routinely generated as part of the standard TRU-D® PCM Drum Monitor measurement. This analysis was based on the patented PuF4 analysis technique developed by VT Nuclear Services personnel to determine the mass ratio of Pu in the form of PuF4 to total Pu mass using the PuF4 reaction gammas and standard Pu gammas observed in the gamma spectrum. This additional, off-line analysis reduces the potential overestimate in the Pu Nuclear Safety Mass associated with each drum aiding the repackaging of the legacy material into Bull Pit cans. Following this, similar measurements and off-line analysis was carried out for the filled Bull Pit cans using a TRU-D® PCM Piece Monitor set up and commissioned specifically for this task. The further analysis results allowed the Bull Pit cans to be efficiently and cost effectively packed in 200 litre drums. The resulting new 200 litre drums were then measured using a standard, routinely operated TRU-D® PCM Drum Monitor for final sentencing (again taking into account off-line PuF4 analysis) to allow safe and secure storage. This paper describes the work carried out and the additional off-line PuF4 analysis techniques and how they have been applied within the exacting demands of Nuclear Safety in support of legacy material treatment and ultimate safe storage.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography